Analysing the implications of cybersecurity breaches on firm leadership

Authors

DOI:

https://doi.org/10.15587/2706-5448.2023.286985

Keywords:

accounting firm, cybersecurity breaches, emotional impact, management, firm leaders, work stress

Abstract

The object of this research is the implications of cybersecurity breaches on the leaders of accounting firms in KwaZulu-Natal, South Africa. The research employed a qualitative approach with interviews as the primary data collection technique. The researcher adopted a rigorous analytical framework, utilising different scholarly sources to analyse and explain the intricate experiences of firm leaders. The study revealed that leaders of accounting firms experience psychological, financial, and social consequences due to cybersecurity breaches. It highlights the emotional impact, including anxiety and increased stress. The fear of potential job losses was found to be one issue leaders were worried about after the data breach. The stress from dealing with the aftermath of data breaches affected their family relationships. In addition, leaders experienced low productivity and increased pressure dealing with the media and organization stakeholders and the stigma associated with data breaches. Given the critical role that accounting firms play in the financial ecosystem and the sensitive nature of the data they handle, it is imperative that cybersecurity is prioritised. However, studies have focused on the financial implications of cybersecurity breaches on businesses, but less attention has been paid to the psychological, social, and financial implications of breaches on firm leaders. The findings are significant for academic discourse but also provide leaders with strategies to mitigate the adverse effects of breaches, while also offering a framework for other researchers and practitioners in different regions and sectors to understand and study the phenomenon further.

Author Biography

Alexander Oluka, Durban University of Technology

PhD

Department of Entrepreneurial and Management Studies

References

  1. Romanosky, S., Hoffman, D., Acquisti, A. (2014). Empirical Analysis of Data Breach Litigation. Journal of Empirical Legal Studies, 11 (1), 74–104. doi: https://doi.org/10.1111/jels.12035
  2. Rogers, R. W. (1975). A Protection Motivation Theory of Fear Appeals and Attitude Change1. The Journal of Psychology, 91 (1), 93–114. doi: https://doi.org/10.1080/00223980.1975.9915803
  3. Floyd, D. L., Prentice-Dunn, S., Rogers, R. W. (2000). A Meta-Analysis of Research on Protection Motivation Theory. Journal of Applied Social Psychology, 30 (2), 407–429. doi: https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
  4. Durnell, E., Okabe-Miyamoto, K., Howell, R. T., Zizi, M. (2020). Online Privacy Breaches, Offline Consequences: Construction and Validation of the Concerns with the Protection of Informational Privacy Scale. International Journal of Human–Computer Interaction, 36 (19), 1834–1848. doi: https://doi.org/10.1080/10447318.2020.1794626
  5. Aboujaoude, E. (2019). Protecting privacy to protect mental health: the new ethical imperative. Journal of Medical Ethics, 45 (9), 604–607. doi: https://doi.org/10.1136/medethics-2018-105313
  6. Kilovaty, I. (2021). Psychological Data Breach Harms. North Carolina Journal of Law & Technology, 23 (1), 1–66.
  7. Taking care of corporate security and employee privacy: why cyber-protection is vital for both businesses and their staff (2020). Kaspersky. Available at: https://media.kasperskydaily.com/wp-content/uploads/sites/92/2020/04/20043942/Kaspersky-2020_Report_Human_angle_FINAL.pdf Last accessed: 04.01.2023
  8. Bada, M., Nurse, J. R. (2020). The social and psychological impact of cyberattacks. Emerging cyber threats and cognitive vulnerabilities. Academic Press, 73–92. doi: https://doi.org/10.1016/b978-0-12-816203-3.00004-6
  9. Gross, M. L., Canetti, D., Vashdi, D. R. (2016). The psychological effects of cyber terrorism. Bulletin of the Atomic Scientists, 72 (5), 284–291. doi: https://doi.org/10.1080/00963402.2016.1216502
  10. Padmanabhan, A., Zhang, J. (2018). Cybersecurity risks and mitigation strategies in additive manufacturing. Progress in Additive Manufacturing, 3 (1-2), 87–93. doi: https://doi.org/10.1007/s40964-017-0036-9
  11. Bachura, E., Valecha, R., Chen, R., Rao, H. R. (2022). The OPM Data Breach: An Investigation of Shared Emotional Reactions on Twitter. MIS Quarterly, 46 (2), 881–910. doi: https://doi.org/10.25300/misq/2022/15596
  12. Solove, D. J., Citron, D. K. (2018). Risk and Anxiety: A Theory of Data Breach Harms. 96 Texas Law Review. doi: https://doi.org/10.2139/ssrn.2885638
  13. Hecht, E. M., Wang, S. S., Fowler, K., Chernyak, V., Fung, A., Zafar, H. M. (2023). Building Effective Teams in the Real World From Traps to Triumph. Journal of the American College of Radiology, 20 (3), 377–384. doi: https://doi.org/10.1016/j.jacr.2022.12.009
  14. Franke, U. (2017). The cyber insurance market in Sweden. Computers & Security, 68, 130–144. doi: https://doi.org/10.1016/j.cose.2017.04.010
  15. Reuters Staff. (2017). Lawsuits against Equifax pile up after massive data breach. Available at: https://www.reuters.com/article/us-equifax-cyber-lawsuits-idUSKCN1BM2E3 Last accessed: 14.10.2023
  16. Brumfield, C. (2019). Equifax’s data breach disaster: Will it change executive attitudes toward security? Available at: https://www.csoonline.com/article/567545/equifax-s-billion-dollar-data-breach-disaster-will-it-change-executive-attitudes-toward-security.html#:~:text=Equifax%27s%202017%20breach%20will%20cost,Topics Last accessed: 14.10.2023
  17. La Torre, M., Dumay, J., Rea, M. A. (2018). Breaching intellectual capital: critical reflections on Big Data security. Meditari Accountancy Research, 26 (3), 463–482. doi: https://doi.org/10.1108/medar-06-2017-0154
  18. Schaefer, T., Brown, B., Graessle, F., Salzsieder, L. (2017). Cybersecurity: common risks: a dynamic set of internal and external threats includes loss of data and revenue, sabotage at the hands of current or former employees, and a PR nightmare. Strategic Finance, 99 (5), 54–62.
  19. Why Do People Make Mistakes That Compromise Cybersecurity? (2020). Tessian. Available at: https://www.tessian.com/resources/psychology-of-human-error-2022/ Last accessed: 06.01.2022
  20. Ronen, S., Donia, M. B. L. (2020). Stifling My Fire: The Impact of Abusive Supervision on Employees’ Motivation and Ensuing Outcomes at Work. Revista de Psicología Del Trabajo y de Las Organizaciones, 36 (3), 205–214. doi: https://doi.org/10.5093/jwop2020a20
  21. From data boom to data doom: the risks and rewards of protecting personal data (2018). Kaspersky. Available at: https://go.kaspersky.com/rs/802-IJN-240/images/Kaspersky_Lab_Business%20in%20a%20data%20boom.pdf Last accessed: 07.06.2023
  22. Creswell, J. W., Creswell, J. D. (2017). Research design: Qualitative, quantitative, and mixed methods approaches. Thousand Oaks: Sage publications.
  23. Bryman, A., Bell, E. (2011). Business research methods. Oxford: Oxford University Press.
  24. Gray, P. S., Williamson, J. B., Karp, D. A., Dalphin, J. R. (2007). The research imagination: An introduction to qualitative and quantitative methods. Cambridge University Press. doi: https://doi.org/10.1017/cbo9780511819391
  25. Fuhrmans, V. (2017). New worry for CEOs: A career-ending cyberattack. Wall Street Journal. Available at: https://www.wsj.com/articles/cybersecurity-tops-priority-list-for-ceos-after-string-of-high-profile-hacks-1507821018 Last accessed: 07.10.2022
  26. Nurse, J. R. C., Creese, S., De Roure, D. (2017). Security Risk Assessment in Internet of Things Systems. IT Professional, 19 (5), 20–26. doi: https://doi.org/10.1109/mitp.2017.3680959
  27. Futuramo. (2023). How Can a Business Data Breach Affect Employees. Available at: https://futuramo.com/blog/how-can-a-business-data-breach-affect-employees/ Last accessed: 13.10.2023
  28. Schlackl, F., Link, N., Hoehle, H. (2022). Antecedents and consequences of data breaches: A systematic review. Information & Management, 59 (4), 103638. doi: https://doi.org/10.1016/j.im.2022.103638
  29. Banker, R. D., Feng, C. (Qian). (2019). The Impact of Information Security Breach Incidents on CIO Turnover. Journal of Information Systems, 33 (3), 309–329. doi: https://doi.org/10.2308/isys-52532
  30. Ferrin, D. L., Cooper, C. D., Dirks, K. T., Kim, P. H. (2018). Heads will roll! Routes to effective trust repair in the aftermath of a CEO transgression. Journal of Trust Research, 8 (1), 7–30. doi: https://doi.org/10.1080/21515581.2017.1419877
Analysing the implications of cybersecurity breaches on firm leadership

Downloads

Published

2023-10-23

How to Cite

Oluka, A. (2023). Analysing the implications of cybersecurity breaches on firm leadership. Technology Audit and Production Reserves, 6(4(74), 20–26. https://doi.org/10.15587/2706-5448.2023.286985

Issue

Section

Economics and Enterprise Management